AUTH-001 Authentication

Enforce Phishing-resistant MFA (FIDO2/CBA) for all administrative accounts, blocking SMS/voice.

AUTH-002 Authentication

Enforce MFA for all users with Number Matching to mitigate MFA fatigue.

AUTH-003 Authentication

Configure Smart Lockout: block the threat actor (IP), not the user account (AD), after 10 failed attempts.

AUTH-004 Authentication

Real-time checking of banned passwords against global (pwned) lists and company dictionaries.

AUTH-005 Authentication

Block interactive login and rotate Service Account secrets every 90 days (or use Managed Identity).

AUTH-006 Authentication

Enforce re-authentication for critical actions (e.g., viewing sensitive data) regardless of token.

AUTH-007 Authentication

Disable legacy protocols (Basic Auth: POP3, IMAP, SMTP) globally.

JML-001 Identity Lifecycle (JML)

Automate 'Birthright' provisioning via HR, creating accounts disabled until the start date.

JML-002 Identity Lifecycle (JML)

Review trigger on transfers: a change of role in HR initiates access recertification.

JML-003 Identity Lifecycle (JML)

Automate exit 'Kill Switch': Blocking and revocation of tokens in <15 min after HR termination.

JML-004 Identity Lifecycle (JML)

Quarterly Access Certification campaigns with automatic revocation if there is no response.

JML-005 Identity Lifecycle (JML)

Detection of orphan accounts (Reconciliation): Compare AD vs HR weekly to find ownerless accounts.

JML-006 Identity Lifecycle (JML)

Strict expiration (TTL) for guest (B2B) accounts, requiring sponsor renewal.

MON-001 Monitoring (MON)

Centralize Audit/Sign-in Logs in a SIEM. Retention: 90 days (hot) / 365 days (cold).

MON-002 Monitoring (MON)

Automatic blocking based on Risk (User/Sign-in Risk) for high-risk events.

MON-003 Monitoring (MON)

Alert on unverified illicit or high-privilege OAuth app consents.

MON-004 Monitoring (MON)

P1 alerts for changes to Tier 0 groups (Global/Domain Admins) with out-of-band notification.

MON-005 Monitoring (MON)

Monitor anomalies in Service Principals (read volume, new IPs, atypical hours).

MON-006 Monitoring (MON)

User feedback ('Not me') in MFA generates an immediate security incident in the SOC.

PAM-001 Privileged Access (PAM)

Eliminate permanent privileges (Zero Standing Privileges). Admin access only Just-In-Time and temporary.

PAM-002 Privileged Access (PAM)

Separate accounts: adm-user (no email/web) for management and user for daily use.

PAM-003 Privileged Access (PAM)

Remove local administrator account and use LAPS for unique, per-workstation rotated passwords.

PAM-004 Privileged Access (PAM)

Implement a Tiered Model (Tiering/Red Forest): Tier 0 admins never log on to Tier 1/2.

PAM-005 Privileged Access (PAM)

2 monitored Emergency (Break Glass) accounts, cloud-only, excluded from MFA and with a long password stored in a vault.

PAM-006 Privileged Access (PAM)

Require dedicated Privileged Access Workstations (PAW) to access management consoles (Azure/AWS).